Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/11570
Title: Analyzing Android browser apps for file:// vulnerabilities
Authors: Wu, D
Chang, RKC 
Issue Date: 2014
Publisher: Springer
Source: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics), 2014, v. 8783, p. 345-363 How to cite?
Journal: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics) 
Abstract: Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as File- Cross, that exploits the vulnerable file:// to obtain users¡¦ private files, such as cookies, bookmarks, and browsing histories. We design an automated system to dynamically test 115 browser apps collected from Google Play and find that 64 of them are vulnerable to the attacks. Among them are the popular Firefox, Baidu and Maxthon bro
URI: http://hdl.handle.net/10397/11570
ISBN: 9.78E+12
ISSN: 0302-9743
EISSN: 1611-3349
Appears in Collections:Conference Paper

Access
View full-text via PolyU eLinks SFX Query
Show full item record

SCOPUSTM   
Citations

4
Citations as of Sep 18, 2017

Page view(s)

57
Last Week
0
Last month
Checked on Sep 18, 2017

Google ScholarTM

Check



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.